BNC IRC proxy is vulnerable to buffer overflow allowing code execution; upgrade to version 2.6.4-3.3.
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
![]() | [SECURITY] [DSA 595-1] New bnc packages arbitrary code execution | 24 Nov 200407:52 | – | debian |
![]() | [SECURITY] [DSA 595-1] New bnc packages arbitrary code execution | 24 Nov 200407:52 | – | debian |
![]() | Debian DSA-595-1 : bnc - buffer overflow | 24 Nov 200400:00 | – | nessus |
![]() | FreeBSD : bnc -- remotely exploitable buffer overflow in getnickuserhost (9be819c6-4633-11d9-a9e7-0001020eed82) | 13 Jul 200500:00 | – | nessus |
![]() | FreeBSD Ports: bnc | 4 Sep 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 595-1 (bnc) | 17 Jan 200800:00 | – | openvas |
![]() | FreeBSD Ports: bnc | 4 Sep 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-595-1) | 17 Jan 200800:00 | – | openvas |
![]() | bnc -- remotely exploitable buffer overflow in getnickuserhost | 10 Nov 200400:00 | – | freebsd |
![]() | CVE-2004-1052 | 1 Mar 200505:00 | – | nvd |
Source | Link |
---|---|
debian | www.debian.org/security/2004/dsa-595 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo